We release patches for security vulnerabilities. Which versions are eligible for receiving such patches depends on the CVSS v3.0 Rating:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via email to: security@utlyze.com
You should receive a response within 48 hours. If for some reason you do not, please follow up via email to ensure we received your original message.
Please include the following information:
- Type of issue (e.g., API key exposure, authentication bypass, etc.)
- Full paths of source file(s) related to the issue
- Location of affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue
We prefer all communications to be in English.
When we receive a security bug report, we will:
- Confirm the problem and determine affected versions
- Audit code to find any similar problems
- Prepare fixes for all supported versions
- Release new versions as soon as possible
If you have suggestions on how this process could be improved, please submit a pull request.
- Never commit API keys to version control
- Use environment variables for all sensitive configuration
- Rotate keys regularly through Cursor team settings
- Limit key permissions if your organization supports it
-
Verify package integrity when installing:
npm view cursor-admin-mcp integrity
-
Use specific versions instead of latest:
npm install cursor-admin-mcp@1.0.0
-
Review dependencies regularly:
npm audit
- Run with minimal permissions
- Use secure transport (HTTPS when using HTTP transport)
- Monitor API usage through Cursor dashboard
- Enable logging for audit trails
- The server requires a Cursor API key with admin privileges
- Keys are passed via environment variables
- Never log or output API keys
- All API calls use HTTPS
- Basic authentication is implemented per Cursor API spec
- No data is stored locally by default
- All date inputs are validated for range limits
- Pagination parameters are sanitized
- Search terms are properly escaped
- API keys stored in environment variables only
- No sensitive data in logs
- Input validation on all user inputs
- HTTPS enforcement for API calls
- Regular dependency updates
- Security headers in HTTP transport mode
- Rate limiting implementation
- Error messages don't expose system details